IOC Report
6sg60cSBIQ.exe

loading gif

Files

File Path
Type
Category
Malicious
6sg60cSBIQ.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_6sg_3152e4b3bd5a32c92a13e818e4165ed38ed22690_24c13995_187d3e90-249f-4e4d-9a2a-3747a8ce9b7f\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_6sg_3152e4b3bd5a32c92a13e818e4165ed38ed22690_24c13995_f6cd8a97-c47f-4df6-9340-375c5d76d18a\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_6sg_3784abb0c760c4a0da83b9de70b0523f3255b47_24c13995_0470cc9b-4e1b-4912-a759-6b38fad3ff74\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_6sg_3784abb0c760c4a0da83b9de70b0523f3255b47_24c13995_a04d76f8-d874-47c2-a198-cd97fde122a0\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8DAF.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Mar 28 15:18:54 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8E2D.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8E5D.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER98CB.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Mar 28 15:18:57 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER992A.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9969.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA510.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Mar 28 15:19:00 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA52F.tmp.dmp
Mini DuMP crash report, 14 streams, Thu Mar 28 15:19:00 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA5BC.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA5DC.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA5EC.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA63A.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 8 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\6sg60cSBIQ.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\6sg60cSBIQ.dll",#1
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\6sg60cSBIQ.dll,Hdooie
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\6sg60cSBIQ.dll",#1
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\6sg60cSBIQ.dll,_invalid_parameter_noinfo_noreturn
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7460 -s 336
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\6sg60cSBIQ.dll,abort
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7636 -s 328
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\6sg60cSBIQ.dll",Hdooie
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\6sg60cSBIQ.dll",_invalid_parameter_noinfo_noreturn
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\6sg60cSBIQ.dll",abort
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7756 -s 340
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 7772 -s 336
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://upx.sf.net
unknown

Domains

Name
IP
Malicious
windowsupdatebg.s.llnwi.net
69.164.0.128

Registry

Path
Value
Malicious
\REGISTRY\A\{b415100e-cee9-bdb0-6719-b008f86f6dd1}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProgramId
\REGISTRY\A\{b415100e-cee9-bdb0-6719-b008f86f6dd1}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
FileId
\REGISTRY\A\{b415100e-cee9-bdb0-6719-b008f86f6dd1}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LowerCaseLongPath
\REGISTRY\A\{b415100e-cee9-bdb0-6719-b008f86f6dd1}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LongPathHash
\REGISTRY\A\{b415100e-cee9-bdb0-6719-b008f86f6dd1}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Name
\REGISTRY\A\{b415100e-cee9-bdb0-6719-b008f86f6dd1}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
OriginalFileName
\REGISTRY\A\{b415100e-cee9-bdb0-6719-b008f86f6dd1}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Publisher
\REGISTRY\A\{b415100e-cee9-bdb0-6719-b008f86f6dd1}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Version
\REGISTRY\A\{b415100e-cee9-bdb0-6719-b008f86f6dd1}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinFileVersion
\REGISTRY\A\{b415100e-cee9-bdb0-6719-b008f86f6dd1}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinaryType
\REGISTRY\A\{b415100e-cee9-bdb0-6719-b008f86f6dd1}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductName
\REGISTRY\A\{b415100e-cee9-bdb0-6719-b008f86f6dd1}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
ProductVersion
\REGISTRY\A\{b415100e-cee9-bdb0-6719-b008f86f6dd1}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
LinkDate
\REGISTRY\A\{b415100e-cee9-bdb0-6719-b008f86f6dd1}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
BinProductVersion
\REGISTRY\A\{b415100e-cee9-bdb0-6719-b008f86f6dd1}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
AppxPackageFullName
\REGISTRY\A\{b415100e-cee9-bdb0-6719-b008f86f6dd1}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
AppxPackageRelativeId
\REGISTRY\A\{b415100e-cee9-bdb0-6719-b008f86f6dd1}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Size
\REGISTRY\A\{b415100e-cee9-bdb0-6719-b008f86f6dd1}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Language
\REGISTRY\A\{b415100e-cee9-bdb0-6719-b008f86f6dd1}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
IsOsComponent
\REGISTRY\A\{b415100e-cee9-bdb0-6719-b008f86f6dd1}\Root\InventoryApplicationFile\rundll32.exe|c8d854bf61fafc41
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018C00B8FA4A2E4
There are 14 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
17DDCFB0000
heap
page read and write
7FF8E7BCC000
unkown
page readonly
247555C0000
heap
page read and write
B14B4FF000
stack
page read and write
17DDB515000
heap
page read and write
7FF8E7BA1000
unkown
page execute read
7FF8E7BC5000
unkown
page readonly
C1F69BC000
stack
page read and write
2433C828000
heap
page read and write
7FF8F7140000
unkown
page readonly
9CA867C000
stack
page read and write
24755340000
heap
page read and write
C1F6C7E000
stack
page read and write
7FF8F7170000
unkown
page readonly
17DDB598000
heap
page read and write
24755360000
heap
page read and write
4B3EFAC000
stack
page read and write
17DDB520000
heap
page read and write
6A20DBF000
stack
page read and write
7FF8F716C000
unkown
page readonly
209CBE0D000
heap
page read and write
209CBD70000
heap
page read and write
7FF8E7BC5000
unkown
page readonly
297F5810000
heap
page read and write
2433C6D0000
heap
page read and write
17DDB510000
heap
page read and write
1F136C80000
heap
page read and write
297F3C60000
heap
page read and write
2475539F000
heap
page read and write
1D7B2990000
heap
page read and write
7FF8F7165000
unkown
page readonly
4B3F2FF000
stack
page read and write
7FF8E7BA0000
unkown
page readonly
2433C995000
heap
page read and write
F0C05FF000
stack
page read and write
2433C990000
heap
page read and write
209CBC70000
heap
page read and write
1D7B2A25000
heap
page read and write
209CBD50000
heap
page read and write
7FF8F716C000
unkown
page readonly
7FF8F7140000
unkown
page readonly
1D7B27A8000
heap
page read and write
209CBE18000
heap
page read and write
297F3E18000
heap
page read and write
209CBE00000
heap
page read and write
1F70A200000
heap
page read and write
9CA86FF000
stack
page read and write
7FF8E7BD0000
unkown
page readonly
209CC090000
heap
page read and write
2433E270000
heap
page read and write
1F70A190000
heap
page read and write
209CBD90000
heap
page read and write
297F3D40000
heap
page read and write
297F3D60000
heap
page read and write
F00738E000
stack
page read and write
7FF8F7165000
unkown
page readonly
1D7B2A20000
heap
page read and write
1F136AA0000
heap
page read and write
1F70A228000
heap
page read and write
24755330000
heap
page read and write
7FF8E7BA0000
unkown
page readonly
F0C04FB000
stack
page read and write
7FF8F7141000
unkown
page execute read
17DDB4E0000
heap
page read and write
2433C7B0000
heap
page read and write
297F3E10000
heap
page read and write
7FF8F7170000
unkown
page readonly
297F40D5000
heap
page read and write
247555C5000
heap
page read and write
24755397000
heap
page read and write
1F138580000
heap
page read and write
6A20D3C000
stack
page read and write
1D7B2720000
heap
page read and write
1F70A5C5000
heap
page read and write
297F40D0000
heap
page read and write
F0C06FF000
stack
page read and write
7FF8E7BD0000
unkown
page readonly
B14B1CC000
stack
page read and write
8EE75EE000
stack
page read and write
F00728C000
stack
page read and write
1F136C10000
heap
page read and write
1F136C88000
heap
page read and write
7FF8F7141000
unkown
page execute read
1D7B2710000
heap
page read and write
1F70A160000
heap
page read and write
1F136C15000
heap
page read and write
B14B47F000
stack
page read and write
1D7B2740000
heap
page read and write
1F70A220000
heap
page read and write
7FF8E7BCC000
unkown
page readonly
1F70A22F000
heap
page read and write
C1F6CFF000
stack
page read and write
1F70A170000
heap
page read and write
17DDB4D0000
heap
page read and write
24755390000
heap
page read and write
17DDB590000
heap
page read and write
7FF8E7BA1000
unkown
page execute read
8EE756E000
stack
page read and write
1F136B80000
heap
page read and write
1D7B27A0000
heap
page read and write
209CBD70000
heap
page read and write
2433C7D0000
heap
page read and write
1F136BA0000
heap
page read and write
24756EB0000
heap
page read and write
1F70A5C0000
heap
page read and write
4B3F27F000
stack
page read and write
6A2107F000
stack
page read and write
9CA877F000
stack
page read and write
2433C820000
heap
page read and write
8EE74EC000
stack
page read and write
F00730F000
stack
page read and write
There are 101 hidden memdumps, click here to show them.